Wednesday, June 17, 2020

Quantifying the efficiency of Cloud protection

https://quicksolvo939231001.blogspot.com/2020/06/the-vulnerability-of-netgear-password.html

Quantifying the efficiency of Cloud protection

McAfee Antivirus

The organizations are rapidly embracing cloud services. In times of coronavirus quarantine lockdowns, adoption has only increased with most federal, state, and local employees operating from home. What is even better news is that we are also seeing increased adoption of cloud security tools, such as CASB, commensurate with the growing cloud footprint of US Public Sector agencies.
So, we now have security tools in place to protect our SaaS, PaaS, and IaaS cloud properties. The next step is to decide what safety controls are needed. What policies should the agency adopt with DLP? What capabilities should be enabled or disabled for a cloud service to maintain a robust security posture? How does an agency actually measure the effectiveness of the safety checks that have been implemented? How do we find out how we are stacking up on our peer organizations?
MVISION Cloud Security Advisor (CSA) was developed by McAfee to address those questions. Cloud Security Advisor is a portal given "out of the box" to the MVISION Cloud CASB tenant at your company. CSA provides the organizations with a detailed collection of guidelines to prioritize efforts to enforce their cloud security controls. The recommendations are broken down into metrics for Visibility and Control. There is also a section that provides quarterly reports on different parameters which we will discuss in a bit.
Once you first enter the dashboard of the Cloud Security Advisor, you are provided with a "magic quadrant" displaying the security status of your company compared to other peer organizations on the Control and Visibility scales and providing a maturity score for both.
There's even an option to pick a vertical market to see how the organizations match up to other business sector organizations.
To the right of the main dashboard are checklist items that provide a brief overview and current progress in following the recommendations of the Cloud Security Advisor. CSA scans the MISION Cloud system of the organization, once every 24 hours. Any changes to MVISION Cloud will show up in the next scan.
From here, a security administrator can simply click on the item on the checklist and then on Activate policy. This will automatically take the user to the DLP Policy Templates page to choose the appropriate enforcement policy.
MVISION Cloud Security Advisor delivers quarterly Cloud Security Reports as a further important capability. These are accessible by going to View Reports from the main CSA dashboard and then choosing a quarter you would like to see the report for.
From there we can start looking at the cloud footprint of our company to classify the total number of Shadow IT services discovered that quarter, as well as some additional Shadow IT statistics.
Next, we will look at all of our AWS, Azure, and GCP environments with IaaS tools.
We then look at detailed statistics for DLP and infringements of the policy on entry. Incidents indicate compliance breaches of any form that are found in all cloud environments of the enterprise protected by MVISION Cloud CASB.
User behavioral patterns and risks discovered by machine-learning system MVISION Cloud UBA.
The report's Malware section offers insights into malware found in MVISION Cloud-connected SaaS and IaaS environments.
The Data at Risk study is perhaps the most applicable to gage the effectiveness of the MVISION Cloud CASB solution. This report demonstrates how much of the organization's data was at risk and how it was secured using MVISION Cloud CASB. There is a downward trend as seen from the picture, suggesting progress is being made in protecting the data of the company.
The Sensitive Data report demonstrates how the company is spreading the sensitive data through all cloud resources the enterprise is using. This study also includes the organization's insights into cloud adoption patterns.
The report "Users" is a pivot table in the Sensitive Data report which organizes individual users' incidents and policy violations. In the end, the report indicates how much of a danger the users of an organization present to the data of the organization.
The Mobile Devices report displays events for each type of mobile device that has been detected.
The CSA report's next three pages include a deeper look into the data at the front page of the CSA site we saw at the beginning of this blog. On the Scores tab, along with improvements relative to previous quarters, we see the "magic quadrant" with Control and Visibility axis. 
Visibility score and Control score assess the sophistication of the company in protecting its cloud footprint, all on a scale of 100.
First, the tab on Visibility metrics. Awareness metrics assess how well a company has done to obtain awareness of what's out there in its cloud environment, and how safe it is.
Finally, the Control indicators page demonstrates how well a company has done in putting controls on its cloud infrastructure and reducing security risks.
And that, to put it briefly, is it. After studying the Cloud Security Advisor you will now have a clear understanding of the metrics at your fingertips to measure the organization's success in cloud protection.

No comments:

Post a Comment